Nessus Scanner - Network Scanning from Beginner to Advanced

Coursera Courses ↗ · Coursera

Open Course on Coursera

Free to audit · Opens on Coursera

Nessus Scanner - Network Scanning from Beginner to Advanced

Coursera · Beginner ·🔐 Cybersecurity ·1mo ago
Updated in May 2025. This course now features Coursera Coach! A smarter way to learn with interactive, real-time conversations that help you test your knowledge, challenge assumptions, and deepen your understanding as you progress through the course. Dive into the world of network security with this guide to using Nessus, one of the most trusted vulnerability scanners in the industry. Starting with the basics, you’ll learn how to install and configure Nessus on various platforms, setting up a robust environment for hands-on practice. The course gradually introduces essential vulnerability assessment concepts, covering passive and active information gathering, manual vulnerability analysis, and the theoretical foundations for a robust security framework. As you progress, you’ll explore each feature of Nessus in detail, from managing scan folders to running practical, real-world scans on live systems. Detailed lessons will walk you through host discovery, operating system identification, and how to analyze and interpret the results of your scans to prioritize remediation efforts. Advanced users will benefit from in-depth tutorials on using Nessus for compliance audits, web application scanning, and performing authenticated scans. The course also covers integration with tools like Metasploit and alternatives like Nmap and Vega, broadening your scanning toolkit. Finally, you'll explore real-life applications of Nessus, including creating reusable scan policies, using compliance templates, and customizing the Nessus scanner with advanced configuration files like nessusd.rules. By the end of this course, you'll not only master Nessus but also learn how to tailor its capabilities to your network's unique needs, making you a more effective and confident security professional. This course is ideal for IT professionals, network administrators, and security analysts looking to enhance their vulnerability scanning and network security skills. A basic understanding of net
Watch on Coursera ↗ (saves to browser)
Sign in to unlock AI tutor explanation · ⚡30

Related AI Lessons

WordPress 7.0 Faces Security Concerns Over AI API Keys via @sejournal, @martinibuster
WordPress 7.0 exposes valuable AI API keys, posing a significant security risk
Search Engine Journal
Secure Video Transcoding API: No FFmpeg Server to Patch
Learn how to secure video transcoding using APIs without relying on FFmpeg servers, reducing vulnerability to over 100 known CVEs
Dev.to · Javid Jamae
Six Trust Boundaries Between Your React App and the Next Compromise
Learn how to establish trust boundaries between your React app and external dependencies to prevent security compromises
Medium · JavaScript
Six Trust Boundaries Between Your React App and the Next Compromise
Learn to secure your React app from supply-chain attacks with 6 trust boundaries after the TanStack npm package compromise
Medium · DevOps
Up next
Your Fancy DNS Tricks Won’t Give You Privacy
David Bombal
Watch →